Targeted Trojan attacks on the rise, report finds

Computer hackers are increasingly tailoring Trojan horse programs for certain businesses in hopes of filching intellectual property, a security report said.

Computer hackers are increasingly tailoring attacks using Trojan horse programs for certain businesses in hopes of filching intellectual property, a new security report released Thursday said.

MessageLabs said its latest research data shows these kinds of attacks have risen six-fold over the same period in 2005. While the increase is dramatic, the number of attempts remains low: The targeted attacks are occurring about once a day rather than one or two per week in 2005, the company said.

An attack e-mail may be sent to people in four or five companies in similar kinds of businesses, said Paul Wood, senior analyst for MessageLabs. The company counts the attempt as one attack.

MessageLabs products filter e-mail and Internet traffic before it reaches its users, and the company studies the traffic for trends. It provides services to around 14,000 business customers worldwide, and its attack statistics are drawn from that data pool.

Wood said the methods of attack are changing since computer security has improved overall. "It's very much more difficult for the cybercriminals to get through organizations' defenses in the same way that they would have done four or five years ago," he said.

The lower the profile of the attack, the greater the chances are for success, as sending out tens of thousands of e-mail messages with bad programs or links is quickly noticed.

The latest method is to send only a few messages, often to specific people in a company, rather than using programs that harvest large numbers of unrelated e-mail addresses from the Internet, Wood said.

Hackers are combining threats through sophisticated programming. Once one malicious program infects a computer, it is often able to download other programs capable of rummaging through files and sending them back to a host, or using the machine to send spam or download adware, Wood said.

To avoid antivirus programs that bluntly filter any e-mail containing an executable attachment, hackers are instead sending links through e-mail or instant messages.

The link can lead to a Web site hosting a malicious program, some of which can automatically start running if a user doesn't have the proper security updates for their browser, Wood said.

Other attacks target vulnerabilities in applications, such as Microsoft's Word or Excel programs. Hackers can find a vulnerability in those programs, constructing a special Word or Excel file that cause other malicious code to run on a computer when opened, Wood said.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Bang and Olufsen Beosound Stage - Dolby Atmos Soundbar

Learn more >

Toys for Boys

Sony WF-1000XM3 Wireless Noise Cancelling Headphones

Learn more >

Nakamichi Delta 100 3-Way Hi Fi Speaker System

Learn more >

ASUS ROG, ACRONYM partner for Special Edition Zephyrus G14

Learn more >

Family Friendly

Mario Kart Live: Home Circuit for Nintendo Switch

Learn more >

Philips Sonicare Diamond Clean 9000 Toothbrush

Learn more >

Stocking Stuffer

SunnyBunny Snowflakes 20 LED Solar Powered Fairy String

Learn more >

Teac 7 inch Swivel Screen Portable DVD Player

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?